Thank you for the incident report. I have created
https://bugzilla.mozilla.org/show_bug.cgi?id=1535873 to track this issue.

- Wayne

On Wed, Mar 13, 2019 at 1:35 PM Doug Beattie via dev-security-policy <
[email protected]> wrote:

> When the serial number issue was first disclosed we reviewed all GlobalSign
> certificates issued from our systems and found no issues wrt serial number
> length.  While all GlobalSign systems are compliant, one of our customers
> running an on-premise CA that chains to a GlobalSign root, AT&T, uses EJBCA
> and has been using the default configuration.  They have been notified to
> immediately stop issuance, update their configurations, replace and then
> revoke all affected certificates.
>
> Their Intermediate CA is: https://crt.sh/?caid=10154
>
> Under that CA they have 3 CAs, and here is the estimated number of
> non-compliant active certificates:
> https://crt.sh/?caid=10155 (fewer than 200 active certificates)
> https://crt.sh/?caid=12658 (14 active 10-day certificates)
> https://crt.sh/?caid=10157  (4 active certificates)
>
>
>
> 1. How your CA first became aware of the problem (e.g. via a problem report
> submitted to your Problem Reporting Mechanism, a discussion in
> mozilla.dev.security.policy, a Bugzilla bug, or internal self-audit), and
> the time and date.
>
> When performing self-compliance check on our Trusted Root customers based
> on
> emails to mdsp list with similar issues.
>
> 2. A timeline of the actions your CA took in response. A timeline is a
> date-and-time-stamped sequence of all relevant events. This may include
> events before the incident was reported, such as when a particular
> requirement became applicable, or a document changed, or a bug was
> introduced, or an audit was done.
>
> 3/1/2019: GlobalSign self-assessment on certificates issued from our data
> center.  All certificates are compliant as we had set sufficient serial
> number lengths prior to the CABF requirement to move to 64 bits of entropy.
>
> 3/13/2019: GlobalSign initiated and completed assessment of SSL
> certificates
> issued by our 3 remaining customers that have CAs chaining to GlobalSign
> roots.  We observed that one of these customers, AT&T, uses EJBCA with the
> default serial number settings.
>
>
> 3. Whether your CA has stopped, or has not yet stopped, issuing
> certificates
> with the problem. A statement that you have will be considered a pledge to
> the community; a statement that you have not requires an explanation.
>
> We have informed AT&T to stop issuance and will confirm that this is the
> case tomorrow morning.
>
> 4. A summary of the problematic certificates. For each problem: number of
> certs, and the date the first and last certs with that problem were issued.
>
> Initial reporting indicates there are fewer than 200 active certificates.
> The links above can be used to identify the detailed list of certificates
> and we will compile a complete list based on input from AT&T
>
> 5. The complete certificate data for the problematic certificates. The
> recommended way to provide this is to ensure each certificate is logged to
> CT and then list the fingerprints or crt.sh IDs, either in the report or as
> an attached spreadsheet, with one list per distinct problem.
>
> We will compute a report shortly, but currently the scope is limited to the
> 3 CAs are listed above.  Every active certificate under these CAs has
> serial
> numbers that contain fewer than 64 bits of entropy.
>
> 6. Explanation about how and why the mistakes were made or bugs introduced,
> and how they avoided detection until now.
>
> We will collect this information from AT&T in the coming days
>
> 7. List of steps your CA is taking to resolve the situation and ensure such
> issuance will not be repeated in the future, accompanied with a timeline of
> when your CA expects to accomplish these things.
>
> We are working with AT&T to correct this problem.  Our plans to revoke
> these
> CAs and to terminate all Trusted Root SSL CAs is on track for August.
>
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to